Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

2.
Ad Hoc Networks <ul><li>The Ad Hoc peer network is created spontaneously as two participating nodes come within the reach of one another. </li></ul><ul><li>As the number of participating nodes and their positions vary the network it self reconfigures allowing all nodes to communicate even if they are not within their transmission range. </li></ul><ul><li>The main advantage of Ad Hoc networks is that they do not require any infrastructure to operate. </li></ul><ul><li>But the main disadvantages are </li></ul><ul><ul><li>Highly dynamic topology due to the mobility of the nodes, i.e. the links are not stable and bandwidth is limited. </li></ul></ul><ul><ul><li>Mobile devices are powered by batteries, putting an energy consumption constraint </li></ul></ul>

3.
Ad Hoc Networks <ul><li>Increasingly wireless technology is build in to many devices. </li></ul><ul><li>Networking these devices can bring many benefits. </li></ul><ul><li>Range of application is vast. </li></ul><ul><ul><li>Military </li></ul></ul><ul><ul><li>Disaster </li></ul></ul><ul><ul><li>Service extension. </li></ul></ul>

4.
Description based Ad Hoc Networks <ul><li>Communication failures are considered normal in Ad-hoc networks. </li></ul><ul><li>Description based addressing instead of host based(IP) addressing is more appropriate because it will not rely on a single path, but uses multicasting . </li></ul><ul><li>In description-based routing, selective information dissemination can be implemented. </li></ul><ul><li>Easy to understanding and manage the network for home environment. </li></ul><ul><li>This will minimize control data among peers and facilitate group communication. </li></ul>

5.
Ad Hoc Network at Home ! <ul><li>Increasingly new functions are built in to home appliances. </li></ul><ul><li>Home appliances fitted with wireless communication modules would become more common in near future. </li></ul><ul><li>The system for home networking provides information required for inter-working environment for home appliances. </li></ul><ul><li>The nodes in this environment could also have the following constraints, </li></ul><ul><ul><li>Low memory </li></ul></ul><ul><ul><li>Low transmission distances </li></ul></ul><ul><ul><li>Some nodes may have limited power supply. </li></ul></ul>

7.
1. Cluster Based Add Hoc Network <ul><li>Why? </li></ul><ul><ul><li>At home most appliances are clustered in places. </li></ul></ul><ul><ul><ul><li>Kitchen </li></ul></ul></ul><ul><ul><ul><li>Living room </li></ul></ul></ul><ul><ul><ul><li>Bed room etc. </li></ul></ul></ul><ul><ul><li>Clustering also reduces the amount of control data exchanged among the nodes. </li></ul></ul><ul><ul><li>Only a portion of the nodes are involved in the actual routing process. </li></ul></ul>

10.
Problem of Routing <ul><li>Does a cluster head know about all other cluster heads? </li></ul><ul><li>This requires high memory capacity ! </li></ul><ul><li>How to route messages beyond known cluster range? </li></ul><ul><ul><li>A fixed size buffer is used to keep track of the nodes that are beyond range. </li></ul></ul><ul><ul><li>Rather than using a table structure this helps reduce the memory usage. </li></ul></ul><ul><ul><li>There is no need to store the full identities or routs. </li></ul></ul>

11.
<ul><li>We assume that identifiers given to the nodes in the network i.e. home appliances are similar to the following examples. </li></ul><ul><li> Kitchen oven, Kitchen television, Living room television etc. </li></ul><ul><li>In this natural language usage, a general location is identified from the beginning words and becomes more specific within that particular area by the next words. </li></ul><ul><li>Our routing algorithm routes the data messages in the direction of the destination. </li></ul><ul><li>When the message finally arrives at the particular region, there would be nodes that store the exact identifier in their Neighbor table, thus allowing the message to be delivered to the correct destination node. </li></ul>2. Description Based Routing and Addressing

12.
<ul><li>How the buffer is used? </li></ul><ul><li>If a cluster head or gateway node comes across another cluster head that is beyond its range, it inserts the name in to the buffer. </li></ul><ul><li>E.g: if the required destination is “kitchen oven” but the buffer entry may be “kitchen”. </li></ul><ul><li>This partial match is enough to ensure that the message gets routed in the direction of the kitchen. </li></ul><ul><li>If the entry is in the 1 st position of the buffer it would be as follows. </li></ul>Buffer Usage 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 n e h c t i k

13.
Buffer storage <ul><li>For the simulation purpose we use a fixed size character buffer. </li></ul><ul><li>Elements are inserted in a way that some of the information about old entries are overwritten by new entries. </li></ul><ul><li>If </li></ul><ul><ul><li>S - Buffer size </li></ul></ul><ul><ul><li>p - Number of parts the buffer is divided in to </li></ul></ul><ul><ul><li>P - The next position in the buffer to be occupied </li></ul></ul><ul><ul><li>B - 1 if data written backwards (If entry number is and odd number) </li></ul></ul><ul><ul><li>F - 1 if data is written forward (If entry number is an even number) </li></ul></ul><ul><ul><li>f - Fibonacci series number. </li></ul></ul><ul><li>When an entry is made in to the buffer the starting position (T) for an entry is given according to the following formula. </li></ul><ul><li> Starting Position T= </li></ul>

14.
Buffer storage <ul><li>The number of characters allocated for an entry in the buffer is given by the following formula, </li></ul><ul><li> </li></ul><ul><li>Number of characters = </li></ul><ul><li>The actual character positions are given by a modified version of the Fibonacci series (0, 1, 2, 3, 5…), where we have omitted the repetition of number 1. Character position in the buffer is given by the following formula, </li></ul><ul><li> </li></ul><ul><li> Character Position = </li></ul>

15.
Description Based Routing <ul><li>When a node receives a message, </li></ul><ul><li>If destination is this node </li></ul><ul><li>Consume data </li></ul><ul><li>Else if I am Gateway/Cluster head and if this data has not already been forwarded </li></ul><ul><li>Look for destination in neighbor table </li></ul><ul><li>If not found </li></ul><ul><li>Look for destination in Cluster Adjacency table </li></ul><ul><li>If not found </li></ul><ul><li>Look for partial match in Cluster Adjacency table </li></ul><ul><li>If not found </li></ul><ul><li>Look for partial/complete match in the Buffer. </li></ul><ul><li>If found </li></ul><ul><li>Forward message </li></ul><ul><li>Else </li></ul><ul><li>Discard message. </li></ul>

16.
<ul><li>A simulation program was developed in order to evaluate the above proposal. </li></ul><ul><li>We have used an environment, which is a flat surface 25*25 square units, where 100 nodes are statically located. </li></ul><ul><li>The size of the buffer was limited to 128 characters. </li></ul><ul><li>Each node has various transmission distance (maximum of 3 units) and priorities. </li></ul><ul><li>Each node will send a number of messages to randomly selected destinations. </li></ul>Evaluation

17.
<ul><li>It shows on average a 92.4% success rate on message delivery. </li></ul>Evaluation The number of messages (Y) Simulation execution (X) Success rate

18.
<ul><li>It shows on average a 100% success rate on message delivery with the current environment setting. </li></ul><ul><li>But… Loss is high !!!. </li></ul>Evaluation – After Simulation Upgrade. Percentage (Y)

19.
<ul><li>The loss occurred because of the use of single buffer. </li></ul><ul><li>Buffer entries do not store the direction of that particular entry. Therefore the messages maybe forwarded to the wrong way as well. </li></ul>Evaluation – The loss?

20.
<ul><li>Routing nodes are given a buffer for each outward link. </li></ul><ul><li>The nodes can now compute the next hop of the messages in the right direction. </li></ul>Solution – Directional buffers

22.
<ul><li>When a message is received by a node that has many outward links, it checks each buffer for a match with the destination. </li></ul><ul><li>If more than one buffer is positively matched the node has to broadcast the message to all outward links. </li></ul><ul><li>Thereafter only the next hop nodes who know the destination will forward the message, and the others will register a lost message. </li></ul>Directional buffers – remaining loss

24.
<ul><li>Considering that a home environment does not contain large number of nodes, this algorithm can be effectively implemented. </li></ul><ul><li>The use of clustering has further supported in reducing the network traffic and routing overhead. </li></ul><ul><li>Use of descriptions improves the user understandability of the system. </li></ul><ul><li>Use of directional buffers will significantly reduce the message loss and improve resource usage. </li></ul>Conclusion

25.
<ul><li>We will study the performance and issues when movement is introduced to the network nodes. In the home environment elements such as cell phones and laptops etc, will have movement associated with them. </li></ul><ul><li>We would also like to find the optimal buffer size for a given number of nodes. </li></ul><ul><li>Divide the same buffer proportional to the number of entries in each direction. </li></ul><ul><li>Further decrease the amount of control information held and transmitted by nodes. </li></ul>Future extensions